Comparison between RSA hardware and software implementation for WSNs sexcurity schemes
The need of security to protect the data through networks has become of vital importance and critical for many sensor network applications. There are several security schemes implemented using hardware or software trying to solve the problem of security in WSN by taking into consideration the limita...
Main Authors: | Md. Tap, Abu Osman, Manttoro, Teddy, Alkalbani, Abdullah Said |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2010
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/15398/ http://irep.iium.edu.my/15398/1/Comparison_between_RSA_hardware_and_software_implementation_for_WSNs_sexcurity_schemes.pdf |
Similar Items
-
RSA with flexible key size: a hardware approach
by: Asaduzzaman, Khandaker, et al.
Published: (2005) -
Implementation of RSA algorithm
by: Rasid, Hafizul Azizi, et al.
Published: (2011) -
Cryptanalysis of RSA
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011) -
SDAW: secure data aggregation watermarking-based scheme in homogeneous WSNs
by: Boubiche, Djallel Eddine, et al.
Published: (2015) -
Rivest-Shamir-Adleman (RSA)
by: Mohammed Hayek, Iqram, et al.
Published: (2011)